Your message dated Mon, 8 Jun 2009 14:51:34 +0200 with message-id <200906081451.40425@fortytwo.ch> and subject line closing at request from submitter has caused the Debian Bug report #459937, regarding ssh: SSH VPN feature no longer works with 4.7p1-1. Downgrading to 4.6p1-5 allows it to work again. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 459937: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459937 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ssh: SSH VPN feature no longer works with 4.7p1-1. Downgrading to 4.6p1-5 allows it to work again.
- From: Chris Dos <chris@chrisdos.com>
- Date: Wed, 02 Jan 2008 09:30:59 -0700
- Message-id: <20080102163059.8941.29905.reportbug@localhost.localdomain>
Package: ssh Version: 1:4.7p1-1 Severity: important After bringing up a vpn tunnel in version 4.7p1-1, the TUN devices on either end are not able to ping each other. Downgrading to 4.6p1-5 allows this feature to work again. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.23.12 (PREEMPT) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) Shell: /bin/sh linked to /bin/bash Versions of packages ssh depends on: ii openssh-client 1:4.6p1-5 secure shell client, an rlogin/rsh ii openssh-server 1:4.6p1-5 secure shell server, an rshd repla ssh recommends no packages. -- no debconf information /etc/ssh/ssh_config Host * # ForwardAgent no ForwardX11 yes # ForwardX11Trusted yes # RhostsRSAAuthentication no # RSAAuthentication yes # PasswordAuthentication yes # HostbasedAuthentication no # BatchMode no # CheckHostIP yes # AddressFamily any # ConnectTimeout 0 # StrictHostKeyChecking ask # IdentityFile ~/.ssh/identity # IdentityFile ~/.ssh/id_rsa # IdentityFile ~/.ssh/id_dsa # Port 22 # Protocol 2,1 # Cipher 3des # Ciphers # aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc EscapeChar ~ Tunnel yes TunnelDevice any:any SendEnv LANG LC_* HashKnownHosts yes /etc/ssh/sshd_config # What ports, IPs and protocols we listen for Port 22 # Use these options to restrict which interfaces/protocols sshd will # bind to #ListenAddress :: #ListenAddress 0.0.0.0 Protocol 2 # HostKeys for protocol version 2 HostKey /etc/ssh/ssh_host_rsa_key HostKey /etc/ssh/ssh_host_dsa_key #Privilege Separation is turned on for security UsePrivilegeSeparation yes # Lifetime and size of ephemeral version 1 server key KeyRegenerationInterval 3600 ServerKeyBits 768 # Logging SyslogFacility AUTH LogLevel INFO # Authentication: LoginGraceTime 120 PermitRootLogin yes StrictModes yes RSAAuthentication yes PubkeyAuthentication yes #AuthorizedKeysFile %h/.ssh/authorized_keys # Don't read the user's ~/.rhosts and ~/.shosts files IgnoreRhosts yes # For this to work you will also need host keys in /etc/ssh_known_hosts RhostsRSAAuthentication no # similar for protocol version 2 HostbasedAuthentication no # Uncomment if you don't trust ~/.ssh/known_hosts for # RhostsRSAAuthentication #IgnoreUserKnownHosts yes # To enable empty passwords, change to yes (NOT RECOMMENDED) PermitEmptyPasswords no # Change to yes to enable challenge-response passwords (beware issues # with # some PAM modules and threads) ChallengeResponseAuthentication no # Change to no to disable tunnelled clear text passwords #PasswordAuthentication yes # Permite Tun Device Tunneling PermitTunnel yes # Kerberos options #KerberosAuthentication no #KerberosGetAFSToken no #KerberosOrLocalPasswd yes #KerberosTicketCleanup yes # GSSAPI options #GSSAPIAuthentication no #GSSAPICleanupCredentials yes X11Forwarding yes X11DisplayOffset 10 PrintMotd no PrintLastLog yes KeepAlive yes #UseLogin no #MaxStartups 10:30:60 #Banner /etc/issue.net # Allow client to pass locale environment variables AcceptEnv LANG LC_* Subsystem sftp /usr/lib/openssh/sftp-server UsePAM yes
--- End Message ---
--- Begin Message ---
- To: 459937-done@bugs.debian.org
- Cc: Chris Dos <chris@chrisdos.com>
- Subject: closing at request from submitter
- From: Adrian von Bidder <avbidder@fortytwo.ch>
- Date: Mon, 8 Jun 2009 14:51:34 +0200
- Message-id: <200906081451.40425@fortytwo.ch>
closing #459937 at request from submitter (Chris: you can easily close a bug by sending email to <bugnumber>-done@bugs.debian.org.) cheers -- vbi -- 90% of the people do not understand copyright, the other 10% simply ignore it. -- Aigars MahinovsAttachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---